Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control
Agenda Ransomware The Internet of Things Botnets
Ransomware
Ransomware – definition Ransom The practice of holding a prisoner or item to extort money to secure their release. Ransomware Malicious software holding your files as prisoners to extort money to secure their release.
Cryptolocker Encrypts your files Files are present but unreadable No need of transfer and remote storage Files can be decrypted only by private key You must pay money to get the key Bitcoins TOR sites
Cryptolocker – infection “Image: works.jpeg” ransomware-spreads-and-how-it-works.html
Cryptolocker – Fake update site
Cryptolocker – Ramification
Cryptolocker – sequels
Ransomware – workstation protection Up-to-date antivirus s and websites are transferred encrypted Endpoint workstation can see them plain Up-to-date software Zero day vulnerabilities elimination Employee training Learn to swim and don't swim in wild river
Ransomware – webfilter +
Ransomware – Intrusion prevention system
Ransomware – Application awareness
Ransomware – Protocol inspection
Ransomware – Antivirus
The Internet of Things
Home Wi-fi router, fridge, lightbulb, printer, extension cord, thermostat Bussines NAS, printer, IP phone, air condition, window blinds
The Internet of Things – pitfalls Low cost chips, small RAM, unprotected OS No spare resources for self-defense Rapid development Small to no focus on security Linux based full-featured computer
The Internet of Things – Attack
The Internet of Things – Recovery Disconnect thing immediately Re-flash firmware or replace Thing Set strong password Perform system audit Logs Scan other systems
The Internet of Things – Prevention Strong password for Thing's administration Update Thing's firmware regularly Don’t buy second hand devices Saving few euros might not pay off
The Internet of Things – Multiple interfaces
The Internet of Things – Access Don't expose Thing's web interface Use VPN to access network behind firewall and then access Thing's web interface locally. If exposing is necessary, use Reverse proxy
The Internet of Things – Reverse Proxy Only web port is exposed Firewall can see and filter all requests
Botnet
Set of computers enslaved by malware performing tasks assigned by master Spam, DDoS Attack, Malware distribution, Bitcoin mining, clickfraud, spying on user Tasks are issued by command & control center
Botnet – attack “Image:Botnet.svg”
Botnet – recovery Scan computers in LAN by up-to-date antivirus Perform audit of firewall logs Negotiate blacklist removal if botnet operation gets your IP address there
Botnet – prevention Forbid access to the Internet underground Webfilter & Content Rules Forbid botnet to call home Blacklists, Security rules
Botnet – Blacklists & Security rules
Summary